Sciweavers

501 search results - page 44 / 101
» Access control and key management for mobile agents
Sort
View
HAIS
2008
Springer
13 years 8 months ago
Design Patterns for Combining Social and Individual Intelligences on Modular-Based Agents
Design patterns have been recently concerned in the multi-agent community for the design of systems with decentralized coordination. In this paper we present a design pattern for d...
Bianca Innocenti, Beatriz López, Joaquim Sa...
EUROSEC
2009
ACM
14 years 2 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
DSOM
2004
Springer
14 years 1 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
COORDINATION
2008
Springer
13 years 9 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
FTDCS
1997
IEEE
13 years 12 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa